Sciweavers

DBSEC
2006
122views Database» more  DBSEC 2006»
13 years 5 months ago
Term Rewriting for Access Control
We demonstrate how access control models and policies can be represented by using term rewriting systems, and how rewriting may be used for evaluating access requests and for provi...
Steve Barker, Maribel Fernández
DBSEC
2006
86views Database» more  DBSEC 2006»
13 years 5 months ago
Enhancing User Privacy Through Data Handling Policies
The protection of privacy is an increasing concern in today's global infrastructure. One of the most important privacy protection principles states that personal information c...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
DBSEC
2006
160views Database» more  DBSEC 2006»
13 years 5 months ago
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation
Abstract. Controlled Query Evaluation (CQE) offers a logical framework to prevent a user of a database from inadvertently gaining knowledge he is not allowed to know. By modeling t...
Joachim Biskup, Lena Wiese
DBSEC
2004
91views Database» more  DBSEC 2004»
13 years 5 months ago
Implementing Real-Time Update of Access Control Policies
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical appl...
Indrakshi Ray, Tai Xin
DBSEC
2004
83views Database» more  DBSEC 2004»
13 years 5 months ago
Attribute Mutability in Usage Control
The notion of Usage Control (UCON) has been introduced recently to extend traditional access controls by including three decision factors called authorizations, obligations, and co...
Jaehong Park, Xinwen Zhang, Ravi S. Sandhu
DBSEC
2004
97views Database» more  DBSEC 2004»
13 years 5 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
DBSEC
2004
108views Database» more  DBSEC 2004»
13 years 5 months ago
Why Is this User Asking so Many Questions? Explaining Sequences of Queries
A sequence of queries submitted by a database user within a short period of time may have a single, illuminating explanation. In this paper we consider sequences of single-record q...
Aybar C. Acar, Amihai Motro
DBSEC
2004
170views Database» more  DBSEC 2004»
13 years 5 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...